Related Topics
Take Another Quiz

Networking Final

127 Questions
Networking Quizzes & Trivia

Quiz questions from after the midterm - final. (go to my other quiz for the earlier stuff)

Questions and Answers
  • 1. 
    Access Points come set up with what type of security enabled by default?
    • A. 

      None

    • B. 

      WEP

    • C. 

      WPA

    • D. 

      TKIP

    • E. 

      WPA-2

  • 2. 
    You need to install wireless Internet access in an open warehouse environment. After installing the equipment the technician notices varying signal strengths throughout the warehouse. What could you do to resolve this?
    • A. 

      Turn on on the broadcast key rotation

    • B. 

      Change the encryption method used on all the AP's

    • C. 

      Change the antenna placement

    • D. 

      Use channel bonding

    • E. 

      Use channel shaping

  • 3. 
    What is the frequency range of the IEEE 802.11a standard?
    • A. 

      2.4 Gbps

    • B. 

      5Gbps

    • C. 

      2.4 GHz

    • D. 

      5 GHz

  • 4. 
    What is the frequency range of the IEEE 802.11g standard?
    • A. 

      2.4 Gbps

    • B. 

      5 Gbps

    • C. 

      2.4 GHz

    • D. 

      5 GHz

  • 5. 
    Which wireless standard allows you to channel bond to increase bandwidth and uses both the 2.4 GHz and 5 GHz frequencies?
    • A. 

      802.11b

    • B. 

      802.11g

    • C. 

      802.11a

    • D. 

      802.11n

  • 6. 
    Which devices can interfere with the operation of a wireless network becasue they operate on similar frequencies?( choose 2)
    • A. 

      Copier

    • B. 

      Microwave Oven

    • C. 

      Toaster

    • D. 

      Cordless Phone

    • E. 

      Ip phone

    • F. 

      AM radio

  • 7. 
    How many non-overlapping channels are available with 802.11b?
    • A. 

      3

    • B. 

      12

    • C. 

      23

    • D. 

      40

  • 8. 
    How many non overlapping channels are avialable with the original 802.11a?
    • A. 

      3

    • B. 

      12

    • C. 

      23

    • D. 

      40

  • 9. 
    What is the maximum data rate for the 802.11a standard?
    • A. 

      6 Mbps

    • B. 

      11 Mbps

    • C. 

      22 Mbps

    • D. 

      54 Mbps

  • 10. 
    You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the AP's?
    • A. 

      Authentication

    • B. 

      Encryption

    • C. 

      Channel Overlap

    • D. 

      AP configuration

  • 11. 
    What is the maximum data rate for the 802.11b standard?
    • A. 

      6 Mbps

    • B. 

      11 Mbps

    • C. 

      22 Mbps

    • D. 

      54 Mbps

  • 12. 
    You connect a new host to your company's wireless network. The host is set to receive a DHCP address, the SSID and the WEP key are entered correctly. However, the host cannot connect to the network. What is the likely problem?
    • A. 

      DNS is not configured on the host

    • B. 

      MAC filtering is enabled on the AP

    • C. 

      The network has run out of wireless connections

    • D. 

      The host is enabled to run 802.11b/g

  • 13. 
    Which is the highest encryption that WPA2 can use?
    • A. 

      AES-CCMP

    • B. 

      PPK via IV

    • C. 

      PSK

    • D. 

      TKIP/MIC

  • 14. 
    Which additonal configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?
    • A. 

      Set the SSID value in the client software to public

    • B. 

      Configure open authentication on the AP and the client

    • C. 

      Set the SSID value on the client to the SSID configured on the AP

    • D. 

      Configure MAC address filtering to permit the client to connect to the AP

  • 15. 
    Which spread-spectum technology does the 802.11b standard define for operation?
    • A. 

      IR

    • B. 

      DSSS

    • C. 

      FHSS

    • D. 

      DSSS AND FHSS

    • E. 

      IR, FHSS AND DSSS

  • 16. 
    Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?
    • A. 

      Using adapters and access points manufactured by the same company

    • B. 

      Overlapping the wireless cell coverage by at least 10%

    • C. 

      Configuring all access points to use the same channel

    • D. 

      Utilizing MAC addresses filtering to allow the client MAC address to authenticate with the surrounding AP's

  • 17. 
    You have installed a point-to-point connection using wireless bridges and omni-directional antennas between two buildings. The throughput is low. What can you do to improve the link?
    • A. 

      Replace the bridges with AP's

    • B. 

      Replace the omni-directional antennas with Yagi's (directional antenna)

    • C. 

      Configure 802.11a on the links

    • D. 

      Install amps to boost the signal

  • 18. 
    What is one reason the WPA encryption is preferred over WEP
    • A. 

      A WPA key is longer and requires more special characters tan the WEP key

    • B. 

      The access point and the client are manually configured with different WPA key values

    • C. 

      WPA key values remain the same until the client configuration is changed

    • D. 

      The values of WPA keys can change dynamically while the system is used

  • 19. 
    Which is true regarding dynamic routing?
    • A. 

      Static routes are best in large networks thus better to use then daynamic routing protocols.

    • B. 

      Static routes are automatically added to the routing table, dynamic routes must be added by hand

    • C. 

      You must use a DNS an WINS server when configuring dynamic routing

    • D. 

      Dynamic routes are automatically added to the routing table

  • 20. 
    Which of the following is true for MAC addresses?
    • A. 

      MAC addresses are never local on the LAN and always pass through a router

    • B. 

      MAC addresses are always local on the LAN and never pass through a router

    • C. 

      MAC addresses will always be the IP address of Fa0/0 interface

    • D. 

      None of the above

  • 21. 
    The time required by protocols to update their forwarding tables after changes have occured is called what?
    • A. 

      Name resolution

    • B. 

      routing

    • C. 

      Convergence

    • D. 

      ARP resolution

  • 22. 
    What command would be used to view the ARP cache on you host?
    • A. 

      C:\ > show ip route

    • B. 

      C:\ > show ip arp

    • C. 

      C:\ > show protocols

    • D. 

      C:\ > arp -a

  • 23. 
    What happens when a router receives a packet for a network that isn't listed in the routing table?
    • A. 

      It forwards the packet to the next available router.

    • B. 

      It holds the packet until the address is updated in the routing table

    • C. 

      The router will use RIP to inform the host that it can't send the packet

    • D. 

      None of these

  • 24. 
    Which of the following is NOT a Distance Vector protocol?
    • A. 

      RIPv1

    • B. 

      RIPv2

    • C. 

      OSPF

    • D. 

      IGRP

  • 25. 
    Which of the following is a Link State Protocol
    • A. 

      RIPv1

    • B. 

      RIPv2

    • C. 

      OSPF

    • D. 

      IGRP

  • 26. 
    Which of the following is a hybrid routing protocol?
    • A. 

      RIPv2

    • B. 

      EIGRP

    • C. 

      IS-IS

    • D. 

      IGRP

  • 27. 
    What two pieces of information does a router require to make a routing decision? A patial answer is OK; wrong answers will be subtracted from right ones.
    • A. 

      Destination network (address)

    • B. 

      Destination MAC address

    • C. 

      Application layer protocol

    • D. 

      Neighbour router

  • 28. 
    Where does a frame have to carry a packet if it is destined for a remote network?
    • A. 

      Default gateway

    • B. 

      Neighbour host

    • C. 

      Switch

    • D. 

      Hub

  • 29. 
    What type of request must a client send if it does NOT know the designation MAC address?
    • A. 

      ARP broadcast

    • B. 

      Multicast

    • C. 

      ICMP redirect

    • D. 

      Reverse ARP

  • 30. 
    You need to preform maintenance on a router in your corporate office. It is important that the network does not go down. What can you do to accomplish your goal?
    • A. 

      Configure the BGP on the router

    • B. 

      Implement NAT on the router

    • C. 

      Configure a static route on the router that temporarily re-routes traffic through another office.

    • D. 

      Implement convergence on the router

  • 31. 
    Why would you want to use a dynamic routing protocol instead of the using static routes?
    • A. 

      Less overhead on the router

    • B. 

      Dynamic routing is more secure

    • C. 

      D) The D) The Dynamic routing scales to larger networks

    • D. 

      The network runs faster

  • 32. 
    Which of the following is a vendor-specific routing protocol?
    • A. 

      RIPv2

    • B. 

      OSPF

    • C. 

      EIGRP

    • D. 

      IS-IS

  • 33. 
    RIP has a long convergence time and users have been complaining of response time when a router goes down and RIP had to reconverge. Which can you implement to improve convergence time on the network?
    • A. 

      Replace RIP with static routes

    • B. 

      Update RIP to RIPv2

    • C. 

      Update RIP to OSPF using Link State

    • D. 

      Replace RIP with BGP as an exterior gateway protocol

  • 34. 
    Which of the following uses only hop count as a metric to find the best path to a remote network?
    • A. 

      RIP

    • B. 

      EIGRP

    • C. 

      OSPF

    • D. 

      BGP

  • 35. 
    What are the 2 categories of routing protocols? A partial answer is OK; wrong answers will be subtracted from right.
    • A. 

      Link State

    • B. 

      Static

    • C. 

      Distance Vector

    • D. 

      EGP

  • 36. 
    To reduce the possibilityof security break-ins from unauthorized users, which should be implemented?
    • A. 

      Packet sniffers

    • B. 

      Firewall

    • C. 

      Port Scanners

    • D. 

      Intrusion detection system

  • 37. 
    What is the main difference between a private network and a public network?
    • A. 

      In a private network, everyone has access. In a public network, only authorized users have access

    • B. 

      In a public network, everyone has access. In a private network, only authorized users have access

    • C. 

      In a private network, only authorized users have access. In a public network, everyone that is connected has access

    • D. 

      In a private network, everyone has access. In a public network, only the first 100 people have access

  • 38. 
    Which IP address should you DENY into your internetwork?
    • A. 

      126.10.10.0/8

    • B. 

      168.0.0.0/8

    • C. 

      128.0.0.0/8

    • D. 

      127.0.0.0/8

  • 39. 
    Which of the following is a tunneling protocol?
    • A. 

      Layer 2 Tunneling Protocol (L2TP)

    • B. 

      Internet Protocol Security (IPsec)

    • C. 

      Secure Sockets Layer (SSL)

    • D. 

      All of the above

  • 40. 
    Which layer of the OSI model does IPSec operate in?
    • A. 

      Physical

    • B. 

      Network

    • C. 

      Transport

    • D. 

      Application

  • 41. 
    Companies that want to ensure their data is secure during transit should follow what practice?
    • A. 

      Firewalls

    • B. 

      Encryption

    • C. 

      Data accounting

    • D. 

      Routing table

  • 42. 
    To encode or read an encrypted message, what tool is necessary?
    • A. 

      Routing table

    • B. 

      Internet access

    • C. 

      Encryption Key

    • D. 

      Email Address

  • 43. 
    Which network utilities do NOT have the ability to encrypt passwords? Select 2..
    • A. 

      FTP

    • B. 

      SSH

    • C. 

      Telnet

    • D. 

      SCP

  • 44. 
    Which keys are known as symmetrical keys?
    • A. 

      Private

    • B. 

      Public

    • C. 

      Diffie-Hellman

    • D. 

      RSA

  • 45. 
    Which of the following is NOT a type of public-key encryption?
    • A. 

      Diffie-Hellman algorithm

    • B. 

      RSA Data Security

    • C. 

      Pretty Good Privacy (PGP)

    • D. 

      DES

  • 46. 
    You asked your ISP for a connection that provides you with 5 or 6 valid host addresses. He gave you 5... why only 5?
    • A. 

      3 host bits give you 8 addresses... less one for the subnet address and less another for the broadcast address leaves 6. One needs to be assigned to your router so it can connect to his, leaving you with 5 valid addresses to work with in the subnet

    • B. 

      Three ones in binary is 1+2+4 = 7. Less one for the subnet address and another for the subnet broadcast address leaves you with 5 valid addresses.

    • C. 

      You said 5 would be fine, so this leaves him with one from that subnet to lease to someone else for additional revenue

    • D. 

      Subnets are only available in powers of 2, less two for the broadcast and subnet addresses. The ISP'S router also needs to have an address in your subnet so you can contact it.

  • 47. 
    You put your home router at address 10.123.123.123 because it's easy to remember. You only want a "window" of 6 addresses in your router's subnet. How many bits would there be in the network portion of your subnet mask?
    • A. 

      32

    • B. 

      31

    • C. 

      30

    • D. 

      29

    • E. 

      28

    • F. 

      24

  • 48. 
    Your router is at address 10.18.18.18 and there are 6 valid hosts in its subnet. What is the address of its subnet?
    • A. 

      10.18.18.18

    • B. 

      10.18.18.16

    • C. 

      10.16.16.16

    • D. 

      10.0.0.0

    • E. 

      10.18.18.6

  • 49. 
    You are connecting two routers and don't want to waste IP addresses. What is the least number of host bits required in the subnet mask to connect them?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      16

    • E. 

      8

  • 50. 
    What does a 29 bit subnet mask look like?
    • A. 

      255.255.255.252

    • B. 

      255.255.255.248

    • C. 

      255.255.255.29

    • D. 

      255.255.255.250

    • E. 

      255.255.255.251

  • 51. 
    To enable priviledged mode on a Cisco router, you enter ____ at the command prompt
  • 52. 
    You've entered interface configuration mode on a Cisco router. How do you set its IP address to 142.156.113.3 with a 30 bit subnet mask?
  • 53. 
    You're using 30 bit subnet masks. THe last subnet was at 142.156.113.88.... what's the address of the next subnet?
    • A. 

      142.156.113.88

    • B. 

      142.156.113.90

    • C. 

      142.156.113.91

    • D. 

      142.156.113.92

    • E. 

      142.156.113.94

    • F. 

      142.156.113.96

    • G. 

      142.156.114.88

  • 54. 
    In interface configuration mode on a Cisco router, what is the command to start up the interface?
  • 55. 
    You're several layers deep in Cisco IOS configuration. What's the single command that will back you right out to priviledged mode?
  • 56. 
     What's the command (with parameters) in Cisco IOS to save the running memory to non-volatile memory?
  • 57. 
    Your router's IP address is 142.156.113.3. What is a command (with parameters) to test if your computer (or another router) can communicate with your router?
  • 58. 
    What's the command (with parameters) in Cisco's IOS to designate the router at 142.156.113.3 as your default gateway?
  • 59. 
    What is the Cisco IOS command to turn on the RIP routing protocol?
  • 60. 
    Why would you want to force RIP to version 2 instead of the default?
    • A. 

      Less traffic: it only broadcasts routing changes, not the whole routing table

    • B. 

      RIP version 2 is backward-compatible with RIP 1, so can talk with both versions

    • C. 

      You're using subnets, not full clas networks

    • D. 

      The default will not accept updates using RIP v2

    • E. 

      It broadcasts more often, ensuing a faster convergence

  • 61. 
    What does a router do with packets from an IP subnet that's not on its routing tables?
    • A. 

      Responds with "destination unreachable"

    • B. 

      Discards them

    • C. 

      Sends the reply to the MAC address of the sender

    • D. 

      Forwards them to the next router

    • E. 

      Broadcasts an ARP to the next subnet address

  • 62. 
    Q) You configured your router with static route that basically says "send everything to this address...". Why does it ignore this rule when sending to hosts on the attached local network? A) Directly-connected networks have a higher precedence in the routing tables than static or dynamic addresses, and will be checked first
    • A. 

      True

    • B. 

      False

  • 63. 
    What protocol is used to find the hardware address of a local device?
    • A. 

      RARP

    • B. 

      ARP

    • C. 

      IP

    • D. 

      ICMP

    • E. 

      BootP

  • 64. 
    You need to login to a Uniz server accross a network that is not secure. Which of the following protocols will allow you to remotely administrator this server securely?
    • A. 

      Telnet

    • B. 

      SSH

    • C. 

      SFTP

    • D. 

      HTTP

  • 65. 
    Which of the following services use TCP? (choose 3)
    • A. 

      DHCP

    • B. 

      SMTP

    • C. 

      SNMP

    • D. 

      FTP

    • E. 

      HTTP

    • F. 

      TFTP

  • 66. 
    Which of the following are TCP/IP protocols used at the Application layer of the OSI model? (Choose 3)
    • A. 

      IP

    • B. 

      TCP

    • C. 

      Telnet

    • D. 

      FTP

    • E. 

      TFTP

  • 67. 
    Which of the following protocols can use TCP and UDP< permits authentication and secure polling of network devices, and allows for automated alerts and reports on network devices?
    • A. 

      DNS

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      TCP

  • 68. 
    This device sends and recieves information about the network layer
    • A. 

      Router

    • B. 

      Switch/Bridge

    • C. 

      Hub

    • D. 

      Repeater

  • 69. 
    This layer creates a virtual circuit before transmitting between two end stations
    • A. 

      Data link

    • B. 

      Network

    • C. 

      Transport

    • D. 

      Session

  • 70. 
    This device uses hardware addresses to filter a network
    • A. 

      Switch/Bridge

    • B. 

      Hub

    • C. 

      Router

  • 71. 
    This device can measure the distance to a remote network
    • A. 

      Hub

    • B. 

      Switch/Bridge

    • C. 

      Router

  • 72. 
    Hardware addresses are defined at the ______ layer Logical addresses are defined at the ________ layer
    • A. 

      Network, Network

    • B. 

      Network, Data Link

    • C. 

      Data Link, Network

    • D. 

      Network, Transport

    • E. 

      Data Link, Transport

  • 73. 
    ______ creates many smaller collision domains, but the network is still one large broadcast domain ______ creates one big collision domain, and one large broadcast domain ______ breaks up collision and broadcast domains
    • A. 

      Hub, Router, Switch or bridge

    • B. 

      Switch or bridge, Hub, Router

    • C. 

      Hub, Switch or bridge, Router

    • D. 

      Switch or bridge, Router, Hub

  • 74. 
    What's the command to show the Ip routing table? (directly-connected, static & dynamic entries)
  • 75. 
    What's the Cisco routing command to set the IP on current interface to 10.10.10.1, subnet mask 255.255.255.0
  • 76. 
    What's the Cisco routing command to enter configuration-from-terminal mode?
  • 77. 
    What's the Cisco routing command to force the interface to full duplex?
  • 78. 
    What's the command to back out of interface configuration, to base configuration?
  • 79. 
    What’s the command to back out of all configuration levels at once?
  • 80. 
    What’s the command to save the running configuration to non-volatile memory? 
  • 81. 
    What is the command to configure 10.10.10.1 as the default gateway?
  • 82. 
    Which TWO of the following are private IP addresses? Choose 2 answers.
    • A. 

      168.172.19.39

    • B. 

      192.168.24.43

    • C. 

      10.201.11.42

    • D. 

      172.33.194.30

    • E. 

      12.0.0.1

  • 83. 
    Which of the following two statements are true?
    • A. 

      An IPv6 address is 128 bits long, hexidecimal

    • B. 

      An IPv4 address is 32 bits long, hexidecimal

    • C. 

      An IPv6 address is 128 bits long, decimal

    • D. 

      An IPv4 address is 32 bits long, decimal

    • E. 

      An IPv6 address is 32 bits long, hexidecimal

  • 84. 
    What is the command, with options, to list a Windows computer's IP settings ... IP, subnet, default gateway, DNS, etc?
  • 85. 
    On a network which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses
    • A. 

      /28

    • B. 

      /29

    • C. 

      /27

    • D. 

      /30

    • E. 

      /31

  • 86. 
    When you ping another host that's in the same subnet, your machine will first issue an ARP request to get its MAC address. If you ping the same host 2 minutes later, it won't ARP
    • A. 

      True

    • B. 

      False

  • 87. 
    What is the valid range of values that may appear in an IPv4 octet? Give your answer in decimal as well as binary.
  • 88. 
    Write the subnet address for 192.168.100.99/25
  • 89. 
    You have a class A host of 10.0.0.110/25. It needs to communicate to a host with and IP address of 10.0.0.210/25 . Which of the following devices do you need to use in order for these hosts to communicate
    • A. 

      Hub

    • B. 

      Layer 2 Switch

    • C. 

      DNS server

    • D. 

      Router

  • 90. 
    TCP and UDP reside at which layer of the OSI model?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      5

    • F. 

      6

    • G. 

      7

  • 91. 
    Which is a valid Class B address?
    • A. 

      129.1.1.1 255.255.0.0

    • B. 

      192.168.1.1 255.255.0.0

    • C. 

      10.1.1.1 255.255.0.0

    • D. 

      126.1.1.1 255.255.0.0

  • 92. 
    Which of the folllowing describes a broadcast address?
    • A. 

      All network bits are on (1s).

    • B. 

      All host bits are off (0s).

    • C. 

      All network bits are off (0s).

    • D. 

      All host bits are on (1s)

  • 93. 
    What protocol is used to find the hardware address of a local device?
    • A. 

      ARP

    • B. 

      BootP

    • C. 

      IP

    • D. 

      ICMP

  • 94. 
    What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?
    • A. 

      14

    • B. 

      15

    • C. 

      62

    • D. 

      30

    • E. 

      31

    • F. 

      16

  • 95. 
    You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway and DNS addresses. Which protocol will you use to accomplish this?
    • A. 

      ARP

    • B. 

      DHCP

    • C. 

      SNMP

    • D. 

      SMTP

  • 96. 
    If your host does not have a default gateway defined, a ping to a host in another subnet won't even be attempted.
    • A. 

      True

    • B. 

      False

  • 97. 
    In a class C IP address, how long is the network address?
    • A. 

      8 bits

    • B. 

      32 bits

    • C. 

      24 bits

    • D. 

      16 bits

  • 98. 
    If a host on a network has the address 172.16.45.14/30 What is the address of the subnet this host belongs to?
    • A. 

      172.16.45.0

    • B. 

      172.16.45.16

    • C. 

      172.16.45.12

    • D. 

      172.16.45.4

    • E. 

      172.16.45.8

  • 99. 
    What protocol helps devices avoid having two devices transmit at the same time on the network medium?
    • A. 

      TFTP

    • B. 

      HTTPS

    • C. 

      TPC/IP

    • D. 

      CSMA/CD

  • 100. 
    At which layer of the OSI model do bridges, hubs, and routers primarily operate, respectively?
    • A. 

      Network, Physical, Data Link

    • B. 

      Data Link, Physical, Network

    • C. 

      Data Link, Data Link, Network

    • D. 

      Physical, Data link, Network

  • 101. 
    What are the two major advantages of fibre optic cabling? It is completely immune to EMI and RFI and can transmit up to 40 kilometres (about 25 miles). It's harder to eavesdrop or wire-tap.
    • A. 

      True

    • B. 

      False

  • 102. 
    Which of the following allows a server to distinguish among different simultaneous requests from the same host?
    • A. 

      A NAT server changes the IP address for subsequent requests

    • B. 

      The MAC address for each one is unique

    • C. 

      A server is unable to accept multiple simultaneous sessions from the same host. One session must end before another can begin

    • D. 

      They have different port numbers

  • 103. 
    _____ This identifies the application the messages is for _____ This identifies the end host the message is for _____ This identifies the next hop to the destination _____ Hardware addresses are defined at this layer
    • A. 

      Port, IP, MAC, data link

    • B. 

      IP, MAC, port, physical

    • C. 

      MAC, port, IP, data link

  • 104. 
    How many valid host addresses are in each subnet of 192.168.100.99/25
  • 105. 
    The maximum distance of 1000Base-T is ?
    • A. 

      128 meters (420 feet)

    • B. 

      1024 meters (3360 feet)

    • C. 

      1000 meters (3280 feet)

    • D. 

      100 Meters (328 feet)

  • 106. 
    What is the valid host range for 192.168.100.99/25
  • 107. 
    A host uses the ________ address to decide whether or not to read in a frame from the media (wire) and pass it up. It uses the _______ address to decide if the message is meant for it, and the ________ address to decide which process should get the message.
    • A. 

      IP, port, MAC

    • B. 

      Port, MAC, IP

    • C. 

      MAC, IP, port

  • 108. 
    Which of the following is a valid Class A address?
    • A. 

      127.10.0.1 255.0.0.0

    • B. 

      126.10.0.1 255.0.0.0

    • C. 

      128.10.0.0 255.0.0.0

    • D. 

      191.10.1 255.0.0.0

  • 109. 
    Two hubs, each connected to a switch port:
    • A. 

      Comprise one collision domain and one broadcast domain

    • B. 

      Comprise two collision domains and one broadcast domain

    • C. 

      Become one collision domain and one broadcast domain when a host on one hub talks to a host on the other hub

    • D. 

      B and C

  • 110. 
    Which of the following is a Class C network address
    • A. 

      10.10.10.0 255.255.255.0

    • B. 

      192.255.254.0 255.255.255.0

    • C. 

      127.0.0.1 255.255.255.0

    • D. 

      128.0.0.0 255.255.0.0

  • 111. 
    The _________ layer of the OSI model specifies voltage, wire speed, and connector pin-outs, and moves bits between devices. Provide the name, not its number.
  • 112. 
    A network administrator uses a crossover cable to connect Host A (IP address 192.168.1.20 Mask 255.255.255.240) and Host B (IP address 192.168.1.201 Mask 255.255.255.240) directly through their Ethernet interfaces. Ping attempts between Host A and Host B are unsuccessful . What can be done to provide connectivity between the Hosts?
    • A. 

      A straight-through cable should be used in place of the crossover cable

    • B. 

      A rollover cable should be used in place of the crossover cable

    • C. 

      A default gateway needs to be set on each host

    • D. 

      The subnet masks should be set to 255.255.255.192

    • E. 

      The subnet masks should be set to 255.255.255.0

  • 113. 
    A cross-over cable is used to connect all the following EXCEPT:
    • A. 

      Hub to switch

    • B. 

      Host to host

    • C. 

      Host to switch

    • D. 

      Switch to switch

  • 114. 
    What is the loop back address?
  • 115. 
    Which of the following is a valid IP address that can be used on the Internet (meaning the public addressing scheme)?
    • A. 

      172.30.1.1

    • B. 

      168.16.1.1

    • C. 

      10.10.1.1

    • D. 

      192.168.201.21

  • 116. 
    Which of the following provides the longest cable run distance
    • A. 

      Multi mode fibre

    • B. 

      Single mode fibre

    • C. 

      Coax

    • D. 

      Category 6e STP

  • 117. 
    Which of the following addresses is not allowed on the Internet? Choose 2 answers.
    • A. 

      191.192.168.1

    • B. 

      192.168.201.11

    • C. 

      10.31.12.251

    • D. 

      191.168.169.254

  • 118. 
    What is the subnetwork address for a host with the IP address 200.10.5.68/28?
    • A. 

      200.10.5.56

    • B. 

      200.10.5.64

    • C. 

      200.10.5.32

    • D. 

      200.10.5.0

  • 119. 
    You receive a call from a user that is complaining that they cannot get on the Internet. You have them verify their IP address, mask, and default geteway. The IP address is 104.0.37.144 with a subnet mask of 255.255.254.0 The default getaway is 104.0.38.1 What is the problem?
    • A. 

      IP address and mask are not compatible

    • B. 

      Gateway IP is incorrect

    • C. 

      Invalid IP address

    • D. 

      Invalid subnet mask

  • 120. 
    On an Ethernet switched network, what address does one host computer use to communicate with another?
    • A. 

      HUB address

    • B. 

      MAC address

    • C. 

      IP address

  • 121. 
    What is the highest usable address on the 172.16.1.0/24 network?
    • A. 

      172.16.1.255

    • B. 

      172.16.1.254

    • C. 

      172.16.1.253

    • D. 

      172.16.1.23

  • 122. 
    Write the broadcast address for 192.168.100.99/25
  • 123. 
    You enter the command "ping www.conestogac.on.ca" into a command prompt and get the response "Ping request could not find host www.conestogac.on.ca.". However, if you ping the server's IP address, you get a reply. What is likely the problem?
    • A. 

      You have an invalid default gateway address

    • B. 

      Your default gateway is set to not respond to ping requests

    • C. 

      There is a problem with your DNS server

    • D. 

      The server's web service is down

    • E. 

      Your connection to the Internet is down

  • 124. 
    You want to connect a host to a switch port. What type of Ethernet cable would you use?
  • 125. 
    Which device by default does NOT forward any broadcast or multicast packets
    • A. 

      Router

    • B. 

      Switch

    • C. 

      Repeater

    • D. 

      Hub

  • 126. 
    You have an interface on a router with the IP address of 192.168.192.10/29 Including the router interface, how many hosts can have IP addresses on the LAN attached to that router interface?
    • A. 

      126

    • B. 

      30

    • C. 

      62

    • D. 

      8

    • E. 

      6

  • 127. 
    You need to transfer files between two hosts. Which two protocols can you use?
    • A. 

      SNMP

    • B. 

      SCP

    • C. 

      RIP

    • D. 

      NTP

    • E. 

      FTP

Related Topics